Kerberos Server Version 3.12 Administrator's Guide
Configuring the Kerberos Server With C-Tree Backend
Autoconfiguring the Kerberos Server
Chapter 570
5) Exit
6) Help
Step 3. To configure the Kerberos Server, select option 1.
The following output is displayed:
1) Configure the Server with LDAP backend
2) Configure the Server with C-Tree backend
0) Return to Previous Menu
Selection: [0]
Step 4. To configure the Kerberos Server with C-Tree backend, select option 2.
Step 5. To remove the existing Kerberos server configuration, press y and press
n to retain the existing database.
Step 6. Configure your Kerberos server as either a primary security server or a
secondary security server:
1. To configure your Kerberos server as a primary security server,
select option 1.
2. To configure your Kerberos server as a secondary security server,
select option 2. Before you log on to the Remote Administrator, stop
the daemons that are already running on the secondary security
server.
Step 7. Specify the encryption type. If you do not specify a value, the default
value, DES-MD5, is selected.
Step 8. To stash the principal database key file on your local disk, press y at the
prompt. Press n if you do not want to stash the principal database key
file.
Step 9. Enter names for other servers:
• If you had chosen to configure your primary security server, you are
prompted for the names of your secondary security servers.
• If you had chosen to configure your secondary security server, you
are prompted for the name of your primary security server.
Step 10. Enter the realm name. The default value is displayed. To use the default,
press Return; otherwise, enter your realm name.